Resource Library

Access the latest white papers, research, webcasts, case studies, and more covering a wide range of technology topics, including security, mobility, application development, cloud computing, analytics, data center, enterprise applications, and virtualization.

Filter the library by ...

Data Interaction is Driving the Next Generation Data Center

As organizations do their best to gain value from their unique data assets and unlock critical information, the way data interacts is changing. Nowhere is this revolution having a greater impact than in the data center.

eBook | Presented by Alfresco Software

Integrate Content & Process

Merging your process and content can transform your organization—putting you that much closer to achieving digital transformation.

Is a Cisco Enterprise Agreement right for you?

Managing Cisco software is becoming more complex. Dealing with multiple licenses, maintenance contracts and pricing changes can take a heavy toll on your time, budget and resources. Good thing we have a solution!

eGuide | Presented by 128 Technology

SD-WAN eGuide

The software-defined wide-area network (SD-WAN) is a specific application of software-defined networking technology applied to WAN connections such as broadband internet

Securing Your Brand With Secure IT Asset Disposition

In this webcast, Christopher Greene of Iron Mountain joins IDG Content Director Joan Goodchild to discuss best practices for Secure IT Asset Disposition (SITAD) and what businesses need to know to dispose and remarket assets securely and lawfully

5 Steps to Making Better Security Decisions

In this report, we define a process for making better decisions faster, first by addressing alert fatigue to make better decisions, and then by introducing situational understanding to make these decisions faster.

eBook | Presented by Aras

A Blueprint for Digital Transformation: Meeting the Challenge of Product Complexity for Global Manufacturers

In this eBook, Aras provides a definition of the Digital Thread and highlights its importance as part of an organization’s Digital Transformation. Discover a blueprint you can use to begin your move to the Digital Thread, in five concrete steps, with examples of companies who are actively pursuing it within their organizations.

eBook | Presented by Palo Alto Networks

eBook: How to Secure Your Business in a Multi-Cloud World

Our brief “How to Secure Your Business in a Multi-Cloud World” highlights an innovative security approach that eliminates the wide range of cloud risks that can cause breaches while enabling your organization to achieve consistent, frictionless protection for all your cloud environments.

3 Steps to Automating Security in Cloud

Whether you’re building your first new cloud environment, already operating in the public cloud with one or more providers, or scaling out to meet increasing demand, we’ve got the answer: a powerful, three-step approach to easily, automatically deploy and integrate advanced security designed for dynamic, multi-cloud environments.

eBook | Presented by Palo Alto Networks

eBook: Business Case for Cloud Threat Defense

Now that your organization is adopting public cloud, securing this adaptive environment is a top priority. That leaves you with an important question: how do you secure it? Do you repurpose traditional data center security tools, piece one together, or use the tools and services from your cloud platform provider?

Load More
Popular Resources